logo
Dates

Author


Conferences

Tags

Sort by:  

Authors: Andrew Martin
2022-10-26

tldr - powered by Generative AI

The presentation discusses the importance of threat modeling and supply chain security in DevOps and provides best practices for securing the supply chain.
  • Threat modeling is important to bring quantifiability and reason to abstract threats and to identify attack paths.
  • The Stride process and standards documents can be used to exhaust potential permutations of threats and identify simple controls to cover as many cases as possible.
  • The attack tree is a visual representation of an attack and can be used to multiply likelihood and impact to give abstract risk scores.
  • Layering controls across the branches of the attack tree can break the attack chain and provide a minimum viable set of security configurations.
  • Pipeline metadata is important for piecing things back together and giving a different type of observation.
  • Best practices for securing the supply chain include using S-bombs, artifact signing, and evidence leaks and ledgers.
  • Measuring SAL level and mean time to remediation are useful indicators of vendor maturity.
  • Retrofitting and slowly maturing the supply chain is important.
  • Asking vendors for S-bombs is a closer first step than asking for SAL level.